Search

Advanced Search

Technology

Showing 86 to 90 of total 278 records

In the era of relentless innovation driven by Artificial Intelligence (AI) and Machine Learning (ML), applications are gaining remarkable capabilities. From intelligent chatbots to precise data analysis, these technologies hold immense promise. However, they also bring vulnerabilities that malicious...

ePrayuktiSewa Online Portal for Mobile App & Bharat Map Service

Kabita Roy Das, Hiranmayee Goswami, Ajit Bhattacharyya, Debojyoti Sarkar
  |   July 2023

e-PrayuktiSewa, created by NIC Assam, is a platform that helps government entities in Assam make better decisions, allocate resources wisely, and stay aware of their surroundings. It does this by offering tools like the Mobile App Builder, Bharat Map services, and AI algorithms, which allow government...

SugamyaWeb Enabling accessible web experience of the Indian Governments websites

Alka Misra, Durga Prasad Misra, Lokesh Joshi
  |   July 2023

SugamyaWeb is a cloud enabled Web Accessibility reporting platform, which provides end-to-end web testing. The tool classifies and prioritizes accessibility issues based on end user impact along with recommendations on how to fix the issue. So, as to enable the teams to target the right to fix, instead...

Puducherry UT French Riviera of the East

S Rajasekaran, V. Gopi Swaminathan
  |   July 2023

NIC, Puducherry UT plays a vital role in designing, developing and implementing ICT solutions which has helped in achieving transparency and efficiency in the delivery of the citizen centric services. In addition to core infrastructure for networks, VC and cloud services, NIC Puducherry has established...

Two common protocols used in microservices are HTTP request/response with resource APIs and lightweight asynchronous messaging when communicating updates across several microservices. This way the small, lightweight modules in MSA architecture can achieve the business domain process. MSA is the established...

Recent Issues

Highlights

Jan. ' 25 Issue


Passkeys and WebAuthn: Revolutionizing Authentication with the Passwordless Technology

Passkeys and WebAuthn are revolutionizing digital authentication by eliminating passwords and enhancing security. ...


Building Secure Applications: Cybersecurity Best Practices for Modern Architecture

Applications expose resources to targeted users and potential attackers. A secured architecture is the foundation of ...


Human-Centered AI Design: A Synergy of Design Thinking and Data Science

Human-Centered AI (HCAI) design ensures AI-driven solutions are aligned with human needs, behaviors, and ethics, integrating ...

Oct. ' 24 Issue


Securing CI/CD Pipelines: Addressing the Unique Challenges in DevOps

CI/CD pipelines enable fast software delivery but come with security risks like weak flow control, IAM gaps, and dependency exploits. ...


Mitigating Cybersecurity Misconfigurations: Exploring Common Cybersecurity Misconfigurations and Effective Techniques for Securing Digital Infrast

Cybersecurity landscape is an ever-evolving battleground in this age of rapid digital transformation. Organization ...


AI Powered Cyberattacks:A key technology in enterprise IT toolbox becoming a weapon of cybercriminals

AI-powered cyberattacks leverage AI and ML algorithms and techniques to automate, accelerate, and enhance various phases of ...

Jul. ‘ 24 Issue


Securing Machine Identities with Multi-Factor Authentication: Enhancing Security and Compliance in a Perimeter-less Network Era

Multi-Factor Authentication (MFA) for machine identities adds an extra layer of security by requiring multiple verification ...


Cryptographic Key Management: Balancing Security and Usability in Key Management

The article explores three cryptographic key management approaches: storing keys in application servers, using Hardware ...


Sanstha Aadhaar: Streamlining Institutional Registration and Monitoring

TejasVI transforms data analysis / visualisation for eGovernance through its user-centric design, integrating various ...